Mathy, Laurent M. J. and Blundell, Nick and Roca, Vincent and El-Sayed, Ayman (2004) Impact of simple cheating in application-level multicast. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. , 1318- 1328.
We study the impact of cheating nodes in application-level multicast overlay trees. We focus on selfish nodes acting independently, cheating about their distance measurements during the control phase building or maintaining the tree. More precisely, we study, through simulations, the impact of simple cheating strategies in four protocols, representatives of different application-level multicast protocol "families": HBM (a protocol based on a centralized approach), TBCP (a distributed, tree first protocol), NICE (a distributed, tree first protocol based on clustering) and NARADA (a mesh first protocol). We evaluate the impact of cheats on the performance of the overlay trees as perceived by their nodes and the underlying network.
|Item Type: ||Contribution in Book/Report/Proceedings|
|Additional Information: ||This paper presents the first quantitative study of the impact of cheating on the structure of application-level multicast trees. Our research shows that in all cases, ALM protocols are very susceptible to structural attacks, with trees quickly exhibiting performance that is worse than if they had been randomly constructed. The evidence, as published work, is that this paper has triggered further research in the community, being the motivational basis of part of the work of Mike Afergan (PhD at MIT and Akamai CTO, USA), Dan Li (Tsinghua University, China) and Jiangchuan Liu (Simon Fraser University, Canada). Acceptance rate = 18%. RAE_import_type : Conference contribution RAE_uoa_type : Computer Science and Informatics|
|Subjects: ||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Departments: ||Faculty of Science and Technology > School of Computing & Communications|
|ID Code: ||2541|
|Deposited By: ||ep_importer|
|Deposited On: ||08 Feb 2010 10:26|
|Last Modified: ||07 Jan 2015 21:39|
|Identification Number: |
Actions (login required)